Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Credit Card Fraud Detection Using Improved Deep Learning Models

    Sumaya S. Sulaiman1,2,*, Ibraheem Nadher3, Sarab M. Hameed2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1049-1069, 2024, DOI:10.32604/cmc.2023.046051

    Abstract Fraud of credit cards is a major issue for financial organizations and individuals. As fraudulent actions become more complex, a demand for better fraud detection systems is rising. Deep learning approaches have shown promise in several fields, including detecting credit card fraud. However, the efficacy of these models is heavily dependent on the careful selection of appropriate hyperparameters. This paper introduces models that integrate deep learning models with hyperparameter tuning techniques to learn the patterns and relationships within credit card transaction data, thereby improving fraud detection. Three deep learning models: AutoEncoder (AE), Convolution Neural Network (CNN), and Long Short-Term Memory… More >

  • Open Access

    ARTICLE

    A Performance Analysis of Machine Learning Techniques for Credit Card Fraud Detection

    Ayesha Aslam1, Adil Hussain2,*

    Journal on Artificial Intelligence, Vol.6, pp. 1-21, 2024, DOI:10.32604/jai.2024.047226

    Abstract With the increased accessibility of global trade information, transaction fraud has become a major worry in global banking and commerce security. The incidence and magnitude of transaction fraud are increasing daily, resulting in significant financial losses for both customers and financial professionals. With improvements in data mining and machine learning in computer science, the capacity to detect transaction fraud is becoming increasingly attainable. The primary goal of this research is to undertake a comparative examination of cutting-edge machine-learning algorithms developed to detect credit card fraud. The research looks at the efficacy of these machine learning algorithms using a publicly available… More >

  • Open Access

    ARTICLE

    The Detection of Fraudulent Smart Contracts Based on ECA-EfficientNet and Data Enhancement

    Xuanchen Zhou1,2,3, Wenzhong Yang2,3,*, Liejun Wang2,3, Fuyuan Wei2,3, KeZiErBieKe HaiLaTi2,3, Yuanyuan Liao2,3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 4073-4087, 2023, DOI:10.32604/cmc.2023.040253

    Abstract With the increasing popularity of Ethereum, smart contracts have become a prime target for fraudulent activities such as Ponzi, honeypot, gambling, and phishing schemes. While some researchers have studied intelligent fraud detection, most research has focused on identifying Ponzi contracts, with little attention given to detecting and preventing gambling or phishing contracts. There are three main issues with current research. Firstly, there exists a severe data imbalance between fraudulent and non-fraudulent contracts. Secondly, the existing detection methods rely on diverse raw features that may not generalize well in identifying various classes of fraudulent contracts. Lastly, most prior studies have used… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique

    Yih Bing Chu*, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta

    Journal of Cyber Security, Vol.5, pp. 33-46, 2023, DOI:10.32604/jcs.2023.045422

    Abstract The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing machine learning models employed. Such… More >

  • Open Access

    ARTICLE

    A Credit Card Fraud Detection Model Based on Multi-Feature Fusion and Generative Adversarial Network

    Yalong Xie1, Aiping Li1,*, Biyin Hu2, Liqun Gao1, Hongkui Tu1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2707-2726, 2023, DOI:10.32604/cmc.2023.037039

    Abstract Credit Card Fraud Detection (CCFD) is an essential technology for banking institutions to control fraud risks and safeguard their reputation. Class imbalance and insufficient representation of feature data relating to credit card transactions are two prevalent issues in the current study field of CCFD, which significantly impact classification models’ performance. To address these issues, this research proposes a novel CCFD model based on Multifeature Fusion and Generative Adversarial Networks (MFGAN). The MFGAN model consists of two modules: a multi-feature fusion module for integrating static and dynamic behavior data of cardholders into a unified highdimensional feature space, and a balance module… More >

  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol.4, No.4, pp. 239-267, 2022, DOI:10.32604/jcs.2023.041095

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly… More >

  • Open Access

    ARTICLE

    Intelligent Financial Fraud Detection Using Artificial Bee Colony Optimization Based Recurrent Neural Network

    T. Karthikeyan1,*, M. Govindarajan1, V. Vijayakumar2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1483-1498, 2023, DOI:10.32604/iasc.2023.037606

    Abstract Frauds don’t follow any recurring patterns. They require the use of unsupervised learning since their behaviour is continually changing. Fraudsters have access to the most recent technology, which gives them the ability to defraud people through online transactions. Fraudsters make assumptions about consumers’ routine behaviour, and fraud develops swiftly. Unsupervised learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other techniques. Building a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization patterns with a focus on fraud situations that cannot… More >

  • Open Access

    ARTICLE

    CDR2IMG: A Bridge from Text to Image in Telecommunication Fraud Detection

    Zhen Zhen1, Jian Gao1,2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 955-973, 2023, DOI:10.32604/csse.2023.039525

    Abstract Telecommunication fraud has run rampant recently worldwide. However, previous studies depend highly on expert knowledge-based feature engineering to extract behavior information, which cannot adapt to the fast-changing modes of fraudulent subscribers. Therefore, we propose a new taxonomy that needs no hand-designed features but directly takes raw Call Detail Records (CDR) data as input for the classifier. Concretely, we proposed a fraud detection method using a convolutional neural network (CNN) by taking CDR data as images and applying computer vision techniques like image augmentation. Comprehensive experiments on the real-world dataset from the 2020 Digital Sichuan Innovation Competition show that our proposed… More >

  • Open Access

    ARTICLE

    Smart Fraud Detection in E-Transactions Using Synthetic Minority Oversampling and Binary Harris Hawks Optimization

    Chandana Gouri Tekkali, Karthika Natarajan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3171-3187, 2023, DOI:10.32604/cmc.2023.036865

    Abstract Fraud Transactions are haunting the economy of many individuals with several factors across the globe. This research focuses on developing a mechanism by integrating various optimized machine-learning algorithms to ensure the security and integrity of digital transactions. This research proposes a novel methodology through three stages. Firstly, Synthetic Minority Oversampling Technique (SMOTE) is applied to get balanced data. Secondly, SMOTE is fed to the nature-inspired Meta Heuristic (MH) algorithm, namely Binary Harris Hawks Optimization (BinHHO), Binary Aquila Optimization (BAO), and Binary Grey Wolf Optimization (BGWO), for feature selection. BinHHO has performed well when compared with the other two. Thirdly, features… More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot… More >

Displaying 1-10 on page 1 of 26. Per Page